computational complexity of reliabilitysecurity in colored networks and privacy preserving

computational complexity of reliabilitysecurity in colored networks and privacy preserving

ID:34385853

大小:177.37 KB

页数:10页

时间:2019-03-05

computational complexity of reliabilitysecurity in colored networks and privacy preserving_第1页
computational complexity of reliabilitysecurity in colored networks and privacy preserving_第2页
computational complexity of reliabilitysecurity in colored networks and privacy preserving_第3页
computational complexity of reliabilitysecurity in colored networks and privacy preserving_第4页
computational complexity of reliabilitysecurity in colored networks and privacy preserving_第5页
资源描述:

《computational complexity of reliabilitysecurity in colored networks and privacy preserving》由会员上传分享,免费在线阅读,更多相关内容在教育资源-天天文库

1、ComputationalComplexityofReliability/SecurityinColoredNetworksandPrivacyPreservingCensorshipYvoDesmedt1;3?,YonggeWang2,andMikeBurmester3??1UniversityCollegeLondon,UK,y.desmedt@cs.ucl.ac.uk2UNCCharlotte,USA,yonwang@uncc.edu3FloridaStateUniversity,USA,b

2、urmester@cs.fsu.eduAbstract.Dolev-Dwork-Waarts-Yunglinkedresearchonreliablepoint-to-pointnet-workswithprivacyandauthenticity.Intheirthreatmodeltheadversarycanonlytakeoveranumberofnodesboundedbyathresholdk.Hirt-Maurerintroducedtheconceptofanadversaryst

3、ructure(i.e.thecomplementofanaccessstructure).Kumar-Goundan-Srinathan-RanganandDesmedt-Wang-BurmestergeneralizedDolev-Dwork-Waarts-Yungscenariostothecaseofageneraladversarystructure.Burmester-Desmedtintroducedaspecialadversarystructure,nowcalledacolor

4、basedadversarystructure.Eachplatforminthenetworkisgivenacolor.Theadversarycancontrolallnodesthathaveuptokdi erentcolors.Althoughthefamilyofcolorbasedadversarystructureshasatrivialrepresentationwhichsizegrowspolynomialinthesizeofthegraph,wewilldemonstr

5、ateinthispaperthatdecidingreliabilityissuesandsecurityissuesareco-NP-complete.Weapplythisresulttostudycensorship,whichforcenturiesoftenhasbeenviewedbyauthoritiesasanessentialsecuritytool.Authoritiesmayrequirenetworkdesign-erstodemonstratethecapability

6、tocensortheinternet.Wepresentazero-knowledgeinteractiveproofforthecaseofacolorbasedadversarystructure.Keywords:networksecurity,Byzantinethreats,secretsharing,adversarystructure,censorship,unconditionalsecurity,zero-knowledge1IntroductionCensorshiphasb

7、eenusedextensivelyduringcenturies.TherecentlyrecoveredGospelofJudas"[16]hasbeenusedasanoccasiontore ectbackonhowthechurchcensoredon-traditional"gospels[17].Todayinmanycountriesbooksremainedcensored.AwellknownexampleisHitler'sMeinKampf."Moreovertex

8、tsdescribingindetailstheconstructionofatomicbombs,orotherclassi edinformation,arealsocensored.Whethercensorshipinalimitedformatisinthebene tofmankindornot,isanon-scienti ctopic,andthereforenotdiscussed.Information,suchasbooks,arepassedonthroug

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。